ISC2 Visitors — Endpoint Product Eval Matrix

Rook Security
SECOPS
Published in
1 min readJul 21, 2009

ISC2 attendees to the webinar “Endpoint Security is Sexy” heard J.J. Thompson speak on harnessing the unique opportunity IT Security professionals are faced with to demonstrate significant, measurable business value in the year ahead.

One way to do this is through Endpoint Security solutions as a subset of a comprehensive data protection strategy.

To give attendees a starting point, the following download is intended to make it a bit easier to get moving on creation of a vendor evaluation matrix for Endpoint Security solutions. More information will be posted as the vendors will most likely provide us with copies of their own evaluation matrices for us to post for you.

We’ve got the whole Endpoint Security Solution selection, implementation, and integration process down pat. After all, it sure isnt rocket science yet we understand that most companies are missing the bandwidth they need right now. Don’t have the time to do your vendor assessment? Let us know (888.712.9531) and we are happy to guide you.

Download the endpoint security vendor product evaluation matrix

--

--

Rook Security
SECOPS
Editor for

Global provider of IT security solutions protecting against dynamic, emerging threats. -- Inc. 500 Company in 2014.